Overview
Syllabus
Intro
This talk in one slide
Motivation
Avoiding unexpected outcomes
DNS Tunneling - Rapid Review
Most critical difference vs legacy data centers
Hypothetical victim
overview
Attack #1 - CatSwap.io web server & DNS
VPC DNS
CatSwap.io container design
AWS ECS
DNS Tunnels in Containers
Applying - containers (and hosts)
Applying what you have learned - DNS
Exploiting Service Endpoints
Service endpoints types & exfiltration options
Attack #3 - CatSwap.io image cluster design
Storage Service Endpoint
Applying - Service Endpoints
Key Takeaways
What to do tomorrow
Final thoughts
Resources
References & Further Reading
Taught by
RSA Conference